TL;DR: This article covers a novel way to expand parameter abuse from a detectable misconfiguration into a stealth, second-stage exploit.
No pages have linked to this URL yet.
Log in or sign up to submit feeds.